Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1140
 
7-14
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Handling Messages from a Group of Senders in the Same Manner
Step 4
Click Save to add the sender and return to the Incoming Mail Overview page.
Related Topics 
Rearranging the Order of the Rules to Perform for Incoming Connections
If you add a sender group to a listener, you may need to edit the sender group order. 
The HAT is read from top to bottom for each host that attempts to connect to the listener. If a rule 
matches a connecting host, the action is taken for that connection immediately. 
Procedure 
Step 1
Navigate to the Mail Policies > HAT Overview page.
Step 2
Choose the listener to edit in the Listener field.
Step 3
Click Edit Order. 
Step 4
Type the new order for existing rows of sender groups in the HAT. 
Cisco recommends maintaining the default order: RELAYLIST (certain hardware models only), 
followed by WHITELIST, BLACKLIST, SUSPECTLIST, and UNKNOWNLIST. 
Step 5
Submit and commit your changes.
Searching for Senders
You can find senders by entering text in the Find Senders field at the top of the HAT Overview page. 
Enter the text to search with and click Find. 
Defining Rules for Incoming Messages Using a Mail Flow Policy
Consider the following rules and guidelines before creating a mail flow policy:
Defaults for the policy are “greyed out” while the “Use Default” radio button is selected. To 
overwrite the default values, enable the feature or setting by selecting the “On” radio button and 
making changes to the now accessible values. To define default values, see 
Some parameters depend on certain pre-configurations. (For example, the Directory Harvest Attack 
prevention setting requires that you have configured an LDAP Acceptance Query.)
Procedure 
Step 1
Navigate to the Mail Policies > Mail Flow Policies page.